User Control Panel
Search iVirtua
Advanced/Tag Search...
Search Users...
What is iVirtua Exclusive Community?
  • An exclusive gaming industry community targeted to, and designed for Professionals, Businesses and Students in the sectors and industries of Gaming, New Media and the Web, all closely related with it's Business and Industry.
  • A Rich content driven service including articles, contributed discussion, news, reviews, networking, downloads, and debate.
  • We strive to cater for cultural influencers, technology decision makers, early adopters and business leaders in the gaming industry.
  • A medium to share your or contribute your ideas, experiences, questions and point of view or network with other colleagues here at iVirtua Community.
Guest's Communication
Live Chat
Teamspeak (VOIP) Audio Conference
Private Messages
Check your Private Messages
Themes
Choose an iVirtua Community theme to reflect your interests...
Business Theme
India/Arabic Theme

Gaming Theme
iVirtua Recommends
Fly Emirates Advertising
US, UK, Australia and friends have cyber-war simulation
Digg This Digg Topic Tag it on del.icio.us Tag topic on On del.icio.us Technorati Search Technorati Search Post to Slashdot Post to Slashdot
You are currently in Business and Industry in Gaming, Media, Web, IT and Computing
Post new topic Reply to topic
Mon Mar 17, 2008 6:57 am Reply and quote this post
Business and government leaders from the US, UK and three othercountries will spend much of this week simulating and defending againsta large-scale cyber attack in an exercise designed to strengthencoordinated responses to what many perceive as a growing threat.
Participants of Cyber Storm II, which also include about 40private-sector companies, will enact a scenario in which "persistent,fictitious adversaries" launch an extended attack using websites,email, phones, faxes and other communications systems. Other countriesinvolved are Australia, New Zealand and Canada.
document.write('\x3Cscript src="http://ad.uk.doubleclick.net/adj/reg.security.4159/crime;'+RegExCats+GetVCs()+'pid='+RegId+RegDT+';'+RegKW+'maid='+maid+';test='+test+';pf='+RegPF+';dcove=d;sz=336x280;tile=3;ord=' + rand + '?" type="text/javascript">\x3C\/script>');
Cyber Storm II comes two weeks after the Pentagon released an assessment of China's military might,warning the People's Liberation Army was intent on expanding itscapabilities for cyber warfare. It also comes amid intelligence reportsthat utilities in several countries have sustained cyber attacks that caused power outages.
This week's exercises are a follow up to Cyber Storm I, which wascompleted two years ago. They are mandated by an act of Congress thatrequires the public and private sectors to strengthen cyberpreparedness.
Companies including Cisco, Juniper Networks, Dow Chemical, AirProducts & Chemical and Wachovia are participating. Nine US statesand at least 18 federal agencies are also involved. They represent thechemical, information technology, communications and transportationindustries, which are considered ctritical parts of the infrastructure.The US Department of Homeland Security is hosting the event - no doubtwith danishes and plenty of Starbucks coffee.
The exercises are designed to sharpen and assess participants'ability to respond to a multi-day, coordinated attack and betterunderstand the "cascading effects" such attacks can have.
Results of Cyber Storm I pointed the the need for bettercoordination between various agencies and for a common framework forcommunicating among different parties.
While it's not necessarily a bad idea to simulate imagined threats,there's no indication that participants will delve into actualpractices that are known to put national security at risk. For example,last week came wordthat a private website operator regularly received official Air Forcecommunications containing sensitive information because his emailaddress was similar to those of military leaders. Additionally, aPentagon official has now confirmed that an attack last year on anetwork belonging to the Department of Defense involved a Windowsvulnerability and allowed the intruders to steal "an amazing amount" ofdata.
As these episodes make clear, sometimes we can be our own worst enemy, no simulation necessary.

Contributed by Editorial Team, Executive Management Team
372659 iVirtua Loyalty Points • View ProfileSend Private MessageBack to Top

Related Articles
Post new topic   Reply to topic


Page 1 of 1

iVirtua Latest
Latest Discussion

Discuss...
Latest Articles and Reviews

Latest Downloads
Subscribe to the iVirtua Community RSS Feed
Use RSS and get automatically notified of new content and contributions on the iVirtua Community.


Tag Cloud
access amd announced applications author based beta building business card case company content cool core course cpu create data deal dec demo design desktop developers development digital download drive email feature features file files firefox flash free future gaming google graphics hardware help industry information intel internet iphone ipod jan launch linux lol love mac market media memory million mobile money movie music net nintendo nov nvidia oct office official online patch performance playing power price product program ps3 pst publish ram release released report rss sales screen search security sep server show size software sony source speed support technology thu tue update video vista war web website wii windows work working works xbox 360 2006 2007 2008

© 2006 - 2008 iVirtua Community (UK), Part of iVirtua Media Group, London (UK). Tel: 020 8144 7222

Terms of Service and Community RulesAdvertise or Affiliate with iVirtuaRSSPress Information and Media CoverageiVirtua Version 4PrivacyContact